QID 216261

Date Published: 2021-05-26

QID 216261: VMware vCenter Server 6.5 Update 6.5 U3p Missing (VMSA-2021-0010)

VMware vCenter is the centralized management tool for the vSphere suite.

The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in which is enabled by default in vCenter Server. (CVE-2021-21985)

The vSphere Client (HTML5) contains a vulnerability in a vSphere authentication mechanism for the Virtual SAN Health Check, Site Recovery, vSphere Lifecycle Manager, and VMware Cloud Director Availability plug-ins.(CVE-2021-21986)

Affected Versions:
VMware vCenter Server 6.5 prior to build 17994927

QID Detection Logic (Unauthenticated):
This QID checks for vulnerable versions of VMware vCenter Server with build version using web service present on target.
QID Detection Logic (Auth):
This QID checks for a workaround in the Windows and Linux OS.
Note: We only support Linux authentication if the customer has a default bash shell assigned to the user.

Successful exploitation of the vulnerability will allow remote code execution and perform actions allowed by the impacted plug-ins without authentication.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as Critical - 10 severity.
  • Solution
    Vmware has released patch for VMware vCenter Server 6.5 , visit VMware vCenter Server 6.5 Update 3p Release Notes

    Refer to VMware advisory VMSA-2021-0010 for more information.

    Workaround:
    Affected Plugins must be set to "incompatible." Disabling a plugin from within the UI does not prevent exploitation. Please refer to KB article KB83829 for more information.

    CVEs related to QID 216261

    Software Advisories
    Advisory ID Software Component Link
    VMSA-2021-0010 URL Logo www.vmware.com/security/advisories/VMSA-2021-0010.html